CN104143069B - A kind of method and system of protection system file - Google Patents
A kind of method and system of protection system file Download PDFInfo
- Publication number
- CN104143069B CN104143069B CN201410379880.8A CN201410379880A CN104143069B CN 104143069 B CN104143069 B CN 104143069B CN 201410379880 A CN201410379880 A CN 201410379880A CN 104143069 B CN104143069 B CN 104143069B
- Authority
- CN
- China
- Prior art keywords
- file
- deleted
- deletion
- viewed
- disabled
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012217 deletion Methods 0.000 claims abstract description 100
- 230000037430 deletion Effects 0.000 claims abstract description 100
- 230000009471 action Effects 0.000 claims abstract description 21
- 230000006870 function Effects 0.000 claims description 11
- 230000008859 change Effects 0.000 claims description 4
- 238000000151 deposition Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of method for protecting file, and methods described includes:Set up the deletion disabled listing file of the complete trails filename of a file for including deletion disabled;When system performs deletion action to file to be deleted, the file to be deleted is checked whether in the deletion disabled listing file, if it is, the complete trails filename of the file to be deleted is stored in a deleted-f iotales list, terminates deletion action;If it is not, then deleting the file to be deleted.Technical scheme can be protected to the file for needing deletion disabled, it is to avoid the system file or other vital documents that can not be deleted are deleted by user error, so as to ensure that the stability of system.
Description
Technical field
The present invention relates to a kind of computer system security, more particularly to a kind of method and system of protection system file.
Background technology
With the popularization and the increase of users ' individualized requirement of modern intelligent terminal so that user is often desirable to that one can be carried out
A little personalized operations.Many third-party root instruments are currently there are, these third-party root instruments can allow
User carries out root authority operation to the mobile terminal based on android system.The user of android system can be by these
Third party root instruments realize the superuser right operation (i.e. root authority is operated) to android system, now, Yong Huyong
Have the sovereign power of whole system, all objects he can operate.But due to general user to android system not
It is familiar with, when the general user for possessing root authority operation carries out various operations to android system, because general user is unclear
Which file of Chu is important system file, it is likely that mistake deletes important system file, and this will cause system to occur
Serious failure, usually causes android system cisco unity malfunction or make it that android system can not be just when being again started up
Often start.
Same the problem of, exists in other using in the system of linux/Unix kernels.Therefore, super use how is prevented
The terminal user of family authority is the deletion of important system file mistake, as a urgent problem to be solved.
The content of the invention
The shortcoming of prior art in view of the above, protects the method for file and is it is an object of the invention to provide a kind of
System, terminal user's asking the deletion of important system file mistake of superuser right is possessed for solution in the prior art
Topic.
In order to achieve the above objects and other related objects, the present invention provides a kind of method for protecting file, methods described bag
Include:Set up the deletion disabled listing file of the complete trails filename of a file for including deletion disabled;In system to be deleted
When file performs deletion action, the file to be deleted is checked whether in the deletion disabled listing file, if it is, will
The complete trails filename of the file to be deleted is stored in a deleted-f iotales list, terminates deletion action;If it is not, then deleting
Except the file to be deleted.
Preferably, methods described be additionally included in system to file directory perform check operation when, under the file directory
Each file to be viewed, the file to be viewed is checked whether in the deleted-f iotales list, if it is, not returning
The fileinfo to be viewed;If it is not, then returning to the fileinfo to be viewed.
Preferably, the system is included in the operating system based on linux kernel.
Preferably, the operating system based on linux kernel includes android system.
Preferably, the system performs implementing to be included in linux kernel and holding for deletion action to file to be deleted
When row arrives virtual file system interface function vfs_unlink, the file to be deleted is checked in vfs_unlink functions whether
In deletion disabled listed files, if it is, the complete trails filename of the file to be deleted is stored in into one has deleted text
In part list, terminate deletion action;If it is not, then deleting the file to be deleted.
Preferably, the system is the operating system based on linux kernel, and described performed to file directory checks operation
Implement including:When virtual file system interface function vfs_readdir is gone in linux kernel, in vfs_readdir
The file directory is checked in function whether in deletion disabled listed files, if it is, not returning to the file to be viewed
Information;If it is not, then returning to the fileinfo to be viewed.
Preferably, user can change the deletion disabled listing file.
Preferably, the deleted-f iotales list is only existed in internal memory.
The present invention also provides a kind of operating system, and the operating system includes deletion disabled listed files unit and deletion
Protection location;The deletion disabled listed files unit is used for the complete trails filename for preserving the file of deletion disabled;It is described to delete
Except protection location is connected with the deletion disabled listed files unit, for performing deletion action to file to be deleted in system
When, the file to be deleted is checked whether in the file of the deletion disabled, if it is, the complete trails of the file is literary
Part name is stored in a deleted-f iotales list, terminates deletion action;If it is not, then deleting the file to be deleted.
Preferably, the operating system also includes display protection location, is connected with the deletion protection location, for being
When system checks operation to file directory execution, to each file to be viewed under the file directory, the text to be viewed is checked
Whether part is in the deleted-f iotales list, if it is, not returning to the fileinfo to be viewed;If it is not, then returning
The fileinfo to be viewed.
As described above, a kind of method and system of protection file of the present invention, have the advantages that:Can be to needing
The file of deletion disabled is protected, it is to avoid the system file or other vital documents that can not be deleted are deleted by user error, from
And ensure that the stability of system.
Brief description of the drawings
Fig. 1 is shown as a kind of schematic flow sheet of an embodiment of the method for protection file of the present invention.
Fig. 2 is shown as a kind of schematic flow sheet of an embodiment of the method for protection file of the present invention.
Fig. 3 is shown as a kind of schematic flow sheet of an embodiment of the method for protection file of the present invention.
Fig. 4 is shown as a kind of schematic flow sheet of an embodiment of the method for protection file of the present invention.
Fig. 5 is shown as a kind of modular structure schematic diagram of an embodiment of the method for protection file of the present invention.
Fig. 6 is shown as a kind of modular structure schematic diagram of an embodiment of the method for protection file of the present invention.
Component label instructions
1 operating system
11 deletion disabled list cells
12 delete protection location
13 display protection locations
S1~S3 steps
Embodiment
Illustrate embodiments of the present invention below by way of specific instantiation, those skilled in the art can be by this specification
Disclosed content understands other advantages and effect of the present invention easily.The present invention can also pass through specific realities different in addition
The mode of applying is embodied or practiced, the various details in this specification can also based on different viewpoints with application, without departing from
Various modifications or alterations are carried out under the spirit of the present invention.
It should be noted that the diagram provided in the present embodiment only illustrates the basic conception of the present invention in a schematic way,
Then only display is painted with relevant component in the present invention rather than according to component count, shape and the size during actual implementation in schema
System, it is actual when implementing, and kenel, quantity and the ratio of each component can be a kind of random change, and its assembly layout kenel also may be used
Can be increasingly complex.
In order to achieve the above objects and other related objects, the present invention provides a kind of method for protecting file.Referring to Fig. 1 institutes
Show, the method for the protection file comprises the following steps:
Step S1, sets up the deletion disabled listing file of the complete trails filename of a file for including deletion disabled.Institute
It can be text or data form file etc. to state deletion disabled listing file, in deletion disabled list text
In part, the complete trails filename for the file that deletion disabled is needed in the system is stored.The complete trails filename refers to include
The filename of file path.For example, in linux system, passwd files are stored in/etc catalogues under, passwd files
Complete trails file is entitled/etc/passwd.In a system, the complete trails filename uniquely specifies a file.With
Family can will need system file name to be protected all storages and in the deletion disabled listing file, so, these need protection
System file can just avoid by user error operation delete.Preferably, user can forbid deleting to described as needed
Except listing file is modified, the complete trails filename in remove ban delete list file is specifically included, increases new system-wide
Footpath filename etc..
Whether step S2, when system performs deletion action to file to be deleted, check the file to be deleted described
In deletion disabled listing file, if it is, the complete trails filename of the file to be deleted is stored in into a deleted document
In list, terminate deletion action;If it is not, then deleting the file to be deleted.Specifically, in system to a file to be deleted
When performing deletion action, the deletion disabled listing file is opened, and read one by one complete in the deletion disabled listing file
Path filename, the complete trails filename of the complete trails filename read and file to be deleted is compared, if both
It is identical, then illustrate the file to be deleted in the deletion disabled listing file, by the complete trails text of the file to be deleted
Part name is stored in a deleted-f iotales list.Now terminate the reading to the complete trails filename in deletion disabled listing file
Take, and the file to be deleted is not deleted really, directly terminate deletion action.If forbidden described in reading one by one
Complete trails filename in delete list file, by the complete trails filename read and the complete trails filename of file to be deleted
It is compared, it is normal to delete described if all complete trails filenames in the deletion disabled listing file are different from
File to be deleted.In order to accelerate the efficiency of system operation, in system operation, system can also be by deletion disabled list text
All complete trails filenames in part are read into internal memory, and by all complete trails filename memory-residents, in order to will be described
The comparison of complete trails filename and filename to be deleted.
In one embodiment, the system in the protection document method is the operating system based on linux kernel.
Include android system in the operating system based on linux kernel.In the operating system based on linux kernel, use
Virtual File System (Virtual File System, VFS).VFS is linux kernel Virtual File System framework, for shielding
The difference of various file system is covered, other modules provide unified file system operation interface for Linux.For example:vfs_
Unlink is the standard interface for being used in linux kernel Virtual File System VFS delete file.Vfs_readdir is in Linux
The standard interface for the file being used in core Virtual File System in Display directory file.In the operating system based on linux kernel
In, it can be operated by carrying out certain processing in Linux virtual file system, to realize the deletion of file and automatic extensive
It is multiple.In other embodiments, the system in the method for protection file of the invention also includes other operating systems of such as ecos.
In one embodiment, as shown in figure 3, the system in the method for the protection file is based in Linux
The operating system of core.Include android system in the operating system based on linux kernel.One is deleted when user performs
During the operation of file, linux system will go to virtual file system interface function vfs_unlink.In vfs_unlink letters
In number, check this document whether in deletion disabled listing file.If this document is not in deletion disabled listing file, i.e. institute
State in deletion disabled listing file and not comprising the file to be deleted, then normal to delete this document, end is deleted to file
Division operation.If this document is in deletion disabled listing file, i.e., comprising described to be deleted in described deletion disabled listing file
File, then the file path information (the complete trails filename of file i.e. to be deleted) is saved in deleted-f iotales list
In, the operation for deleting disk file is not performed, directly returns and deletes successfully, terminate the deletion action to this document.In fact, institute
State file not to be deleted really, the file is simply added in deleted-f iotales list by the deletion action to this document.
The deleted-f iotales list can be existed only in internal memory, be present in chained list or other modes in internal memory.When having deleted text
When part list is existed only in internal memory, after system restarting, the deleted-f iotales list is naturally sky, and system is returned to pair
The all not deleted state of all deletion disabled files.The deleted-f iotales list can also be saved in one and login user
In related deletion file, now, if system reboot, the user logs in again, reads the deletion file, then can keep it
Deleted-f iotales list in the past, certainly, what these files were actually still present.If other users are logged in, then not
This document is read, system is returned to all not deleted states of deletion disabled file.
As shown in Fig. 2 in one embodiment, the method for shown protection file not only includes above-mentioned steps S1 and step
S2, but also including step S3.Step S3 is:When system performs to file directory and checks operation, under the file directory
Each file to be viewed, the file to be viewed is checked whether in the deleted-f iotales list, if it is, not returning
The fileinfo to be viewed;If it is not, then returning to the fileinfo to be viewed.Specifically, in system to a file mesh
When operation is checked in record execution, to each file (i.e. each file to be viewed) in the file directory of reading, under progress
Row operation:By the complete trails filename and deleted-f iotales list of the file (file to be viewed) in the read file directory
In complete trails filename compared one by one, if both are identical, illustrate that the file to be viewed has deleted row described
In list file.Do not return to the fileinfo to be viewed now, equivalent to the file to be viewed as non-existent file.Will
Read the system-wide in the complete trails filename and deleted-f iotales list of the file (file to be viewed) in the file directory
Footpath filename is compared one by one, if be different from, and illustrates the file to be viewed not in the delete list file
In.Now return to the fileinfo to be viewed, i.e. system and normally get the fileinfo to be viewed.In actual operation
In, when this method make it that user checks some catalogue, the file deleted under the catalogue by user is not shown, i.e., to user
Speech, is the equal of deleted file.And alternative document is normally shown.
In one embodiment, as shown in figure 4, the system in the method for the protection file is based in Linux
The operating system of core.Include android system in the operating system based on linux kernel.One is checked when user performs
During the operation of file directory, linux system will go to virtual file system interface function vfs_readdir.In vfs_
In readdir functions, to each file (i.e. each file to be viewed) under the file directory, whether this document is checked
In deleted-f iotales list.If this document is not in deleted-f iotales list, i.e., in described deleted-f iotales list not
It is comprising the file to be viewed, then normal to show this document.It is if this document is in deleted-f iotales list, i.e., described to have deleted
The file to be viewed is included in listed files, then does not return to the information of this document, this document is not shown now.
In specific implement, the step 2 and step 3 can be performed repeatedly, and not need strict implement order,
It is not limited with above-described embodiment.In one embodiment, it is automatic to set up empty deleted document row after system starts
Table;At this point it is possible to perform step 3 in the case where having not carried out step 2.
The present invention also provides a kind of operating system.In one embodiment, as shown in figure 5, the operating system 1 includes prohibiting
Only delete listed files unit 11 and delete protection location 12.
The deletion disabled listed files unit 11 is used for the complete trails filename for preserving the file of deletion disabled.
The deletion protection location 12 is connected with the deletion disabled listed files unit 11, from the deletion disabled file
The complete trails filename of the file of all deletion disableds is obtained in list cell.The deletion protection location 12 is used in system pair
When file to be deleted performs deletion action, check the file to be deleted whether in the file of the deletion disabled.If it is,
The complete trails filename of the file is stored in one in the file of the deletion disabled, then and deleted by the file to be deleted
In listed files, terminate deletion action;If not, the file to be deleted is then deleted not in the file of the deletion disabled
The file to be deleted.
In one embodiment, as shown in fig. 6, the operating system 1 includes deletion disabled listed files unit 11, deleted
Protection location 12 and display protection location 13.
The deletion disabled listed files unit 11 is used for the complete trails filename for preserving the file of deletion disabled.
The deletion protection location 12 is connected with the deletion disabled listed files unit 11, from the deletion disabled file
The complete trails filename of the file of all deletion disableds is obtained in list cell.The deletion protection location 12 is used in system pair
When file to be deleted performs deletion action, check the file to be deleted whether in the file of the deletion disabled.If it is,
The complete trails filename of the file is stored in one in the file of the deletion disabled, then and deleted by the file to be deleted
In listed files, terminate deletion action;If not, the file to be deleted is then deleted not in the file of the deletion disabled
The file to be deleted.
The display protection location 13 is connected with the deletion protection location 12, is obtained from the deletion protection location 12
Deleted-f iotales list.The display protection location 13 is used for when system performs to file directory and checks operation, to the text
Whether each file to be viewed under part catalogue, check the file to be viewed in the deleted-f iotales list.If it is,
The file to be viewed does not return to the fileinfo to be viewed in the deleted-f iotales list, then, is not shown to user
This document.If not, the file to be viewed does not return to the file letter to be viewed in the deleted-f iotales list, then
Breath, this document is normally shown to user.
In various embodiments, operating system of the invention can include the operating system based on linux kernel, such as
Android system etc..The operating system of the present invention can also be other operating systems, especially mobile phone operating system.
In summary, a kind of method and system of protection file of the invention, have the advantages that:Can be to needing
The file of deletion disabled is protected, it is to avoid the system file or other vital documents that can not be deleted are deleted by user error, from
And ensure that the stability of system.So, the present invention effectively overcomes various shortcoming of the prior art and has high industrial profit
With value.
The above-described embodiments merely illustrate the principles and effects of the present invention, not for the limitation present invention.It is any ripe
Know the personage of this technology all can carry out modifications and changes under the spirit and scope without prejudice to the present invention to above-described embodiment.Cause
This, those of ordinary skill in the art is complete without departing from disclosed spirit and institute under technological thought such as
Into all equivalent modifications or change, should by the present invention claim be covered.
Claims (8)
1. a kind of method for protecting file, it is characterised in that methods described includes:
Set up the deletion disabled listing file of the complete trails filename of a file for including deletion disabled;
When system performs deletion action to file to be deleted, check the file to be deleted whether in the deletion disabled list
In file, if it is, the complete trails filename of the file to be deleted is stored in a deleted-f iotales list, terminate to delete
Division operation;If it is not, then deleting the file to be deleted;
When system performs to file directory and checks operation, to each file to be viewed under the file directory, check described
Whether file to be viewed is in the deleted-f iotales list, if it is, not returning to the fileinfo to be viewed;If
It is no, then return to the fileinfo to be viewed.
2. the method for protection file according to claim 1, it is characterised in that:The system includes being based on linux kernel
Operating system in.
3. the method for protection file according to claim 2, it is characterised in that:The operation system based on linux kernel
System includes android system.
4. the method for protection file according to claim 2, it is characterised in that:The system is performed to file to be deleted and deleted
The implementing of division operation is included in linux kernel when going to virtual file system interface function vfs_unlink,
The file to be deleted is checked in vfs_unlink functions whether in deletion disabled listed files, if it is, being treated described
The complete trails filename for deleting file is stored in a deleted-f iotales list, terminates deletion action;If it is not, then deleting institute
State file to be deleted.
5. the method for protection file according to claim 1, it is characterised in that:The system is based on linux kernel
Operating system, it is described to file directory perform check operation implement including:Virtual file system is gone in linux kernel
During system interface function vfs_readdir, check the file directory whether in deletion disabled file in vfs_readdir functions
In list, if it is, not returning to the fileinfo to be viewed;If it is not, then returning to the fileinfo to be viewed.
6. the method for protection file according to claim 1, it is characterised in that:User can change the deletion disabled row
List file.
7. the method for protection file according to claim 1, it is characterised in that:In the deleted-f iotales list is only existed
In depositing.
8. a kind of operating system of the method for any one of use claim 1-7 protection file, it is characterised in that:The operation
System includes:
Deletion disabled listed files unit, the complete trails filename of the file for preserving deletion disabled;
Protection location is deleted, is connected with the deletion disabled listed files unit, is deleted for being performed in system to file to be deleted
During division operation, the file to be deleted is checked whether in the file of the deletion disabled, if it is, by the complete of the file
Path filename is stored in a deleted-f iotales list, terminates deletion action;If it is not, then deleting the file to be deleted;
The operating system also includes:
Protection location is shown, is connected with the deletion protection location, it is right for when system performs to file directory and checks operation
Each file to be viewed under the file directory, checks the file to be viewed whether in the deleted-f iotales list,
If it is, not returning to the fileinfo to be viewed;If it is not, then returning to the fileinfo to be viewed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410379880.8A CN104143069B (en) | 2014-08-04 | 2014-08-04 | A kind of method and system of protection system file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410379880.8A CN104143069B (en) | 2014-08-04 | 2014-08-04 | A kind of method and system of protection system file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104143069A CN104143069A (en) | 2014-11-12 |
CN104143069B true CN104143069B (en) | 2017-09-29 |
Family
ID=51852239
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410379880.8A Expired - Fee Related CN104143069B (en) | 2014-08-04 | 2014-08-04 | A kind of method and system of protection system file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104143069B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104933187B (en) * | 2015-07-06 | 2019-02-01 | 张兆琦 | It is a kind of for operating system or the temporary file management method of application program |
CN105095025B (en) * | 2015-08-28 | 2018-11-02 | 小米科技有限责任公司 | Restore the method and device of deleted document in ext file system |
CN105045686B (en) * | 2015-08-28 | 2019-03-01 | 小米科技有限责任公司 | File access pattern method and device |
CN105930739B (en) * | 2016-04-14 | 2019-07-23 | 珠海豹趣科技有限公司 | A kind of method and terminal for preventing file deleted |
CN106778340B (en) * | 2016-11-30 | 2019-07-16 | Oppo广东移动通信有限公司 | Delet method, device and the mobile terminal of data |
CN107153539B (en) * | 2017-04-18 | 2021-03-30 | 北京思特奇信息技术股份有限公司 | File interface system |
CN107766549A (en) * | 2017-10-31 | 2018-03-06 | 珠海市魅族科技有限公司 | Text delet method and device, terminal installation and readable storage medium storing program for executing |
CN107807985A (en) * | 2017-10-31 | 2018-03-16 | 珠海市魅族科技有限公司 | Multimedia control method and device, terminal installation and computer-readable recording medium |
CN108304477A (en) * | 2017-12-28 | 2018-07-20 | 维沃移动通信有限公司 | A kind of document handling method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1719921A (en) * | 2004-07-06 | 2006-01-11 | 乐金电子(中国)研究开发中心有限公司 | Data deleting preventing method for mobile communication terminal |
CN101989211A (en) * | 2010-11-24 | 2011-03-23 | 北京安天电子设备有限公司 | Method and system for unloading software |
CN102609495A (en) * | 2012-01-29 | 2012-07-25 | 奇智软件(北京)有限公司 | Method for deleting file and system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI425375B (en) * | 2010-01-20 | 2014-02-01 | Inventec Corp | Method of file management of server |
US9390109B2 (en) * | 2012-12-21 | 2016-07-12 | Commvault Systems, Inc. | Systems and methods to detect deleted files |
-
2014
- 2014-08-04 CN CN201410379880.8A patent/CN104143069B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1719921A (en) * | 2004-07-06 | 2006-01-11 | 乐金电子(中国)研究开发中心有限公司 | Data deleting preventing method for mobile communication terminal |
CN101989211A (en) * | 2010-11-24 | 2011-03-23 | 北京安天电子设备有限公司 | Method and system for unloading software |
CN102609495A (en) * | 2012-01-29 | 2012-07-25 | 奇智软件(北京)有限公司 | Method for deleting file and system |
Also Published As
Publication number | Publication date |
---|---|
CN104143069A (en) | 2014-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104143069B (en) | A kind of method and system of protection system file | |
CN104699423B (en) | The method and apparatus that drive is bound in linux system | |
US9230111B1 (en) | Systems and methods for protecting document files from macro threats | |
US8600947B1 (en) | Systems and methods for providing backup interfaces | |
Zdziarski | iPhone forensics: recovering evidence, personal data, and corporate assets | |
US9658925B1 (en) | Systems and methods for restoring application data | |
CN105391587B (en) | The Samba configuring management methods and system of a kind of network equipment | |
CN103093145B (en) | A kind of methods, devices and systems scanning movable storage device | |
US11062129B2 (en) | Systems and methods for enabling search services to highlight documents | |
CN102646079B (en) | Disk data protection method oriented to Linux operating system | |
CN104035842A (en) | Method for deleting and recovering built-in application program | |
US20090254585A1 (en) | Method for Associating Administrative Policies with User-Definable Groups of Files | |
CN102819717B (en) | Method and device for carrying out protection processing on file | |
CN103389905B (en) | Plug-in loading method and system | |
CN106326129A (en) | Program abnormity information generating method and device | |
CN103617039B (en) | Method and device for accessing user space file system | |
CN107368330A (en) | Client patch restorative procedure, device and system | |
CN107566405B (en) | Storage resource pooling method for quick access and copy | |
CN101950339A (en) | Security protection method and system of computer | |
US9367573B1 (en) | Methods and apparatus for archiving system having enhanced processing efficiency | |
US9020896B1 (en) | Systems and methods for simplifying data restoration using resource types | |
CN103177112B (en) | A kind of backup browsing file system | |
US10311021B1 (en) | Systems and methods for indexing backup file metadata | |
CN102184368A (en) | Method for safely using mobile storage device | |
CN103559204A (en) | Database operation request processing method, unit and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PP01 | Preservation of patent right | ||
PP01 | Preservation of patent right |
Effective date of registration: 20180313 Granted publication date: 20170929 |
|
PD01 | Discharge of preservation of patent | ||
PD01 | Discharge of preservation of patent |
Date of cancellation: 20210313 Granted publication date: 20170929 |
|
PP01 | Preservation of patent right | ||
PP01 | Preservation of patent right |
Effective date of registration: 20210313 Granted publication date: 20170929 |
|
PD01 | Discharge of preservation of patent | ||
PD01 | Discharge of preservation of patent |
Date of cancellation: 20240313 Granted publication date: 20170929 |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170929 |